This article was featured in Internal Audit 360.
Driven by global megatrends and digital transformation needs, the market for RPA continues to grow and evolve as enterprises across industry sectors look to reshape business operations.
Collaborating author: Christeen Russell
As cloud computing continues to bring about dramatic technological advances, organizations must balance the risk of not innovating with its risk appetite..
Once upon a time, Little Red Riding Hood ventured out into the forest to visit her poor, sick grandmother. Along the way, she encountered a charming wolf who gave her no cause for alarm. Although..
As internal auditors, whether we have IT in our educational background or not, we have learned the basics around IT General Controls because so much of the control environment resides in..
I am often asked, “how long will it take to implement our new solution?” My stock and somewhat disappointing answer is always – it depends. As with all system implementations, there are four..
As I sent my son back to school last month, I quickly realized the carefree days of summer were behind us. It means battles over stricter bedtime, doing homework and more screen-time limits. It..
I used to define negotiation as that arduous battle of wills between two parties that was best illustrated by my least favorite activity in the world…buying a car. That was until I became a..
I recently took my six-year old to see Beauty and the Beast. After the movie, he began asking questions like “Why did the Beast throw the rose on the ground?” or “Why did the Enchantress turn the..
The financial crisis of 2008-2009 erupted across the globe, leaving a wide array of proposed regulations in its wake. Over the past seven years many regulations have been written and implemented..
Say “Rule 504” to Chief Compliance Officers of NY Financial Institutions and it may send chills down their spine. Recent regulatory lapses and cases involving penalties against financial..
As organizations attempt to stay ahead of cyber threats, Social Engineering tops the list of the most popular hacking methods. Social Engineering is the use of human interaction to obtain..